General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
240519-ede26ahb56
-
MD5
ae02283593dc891884170b46eb346a51
-
SHA1
7fbb3b77f2be8fe31bca479b857d18c421edc75c
-
SHA256
f4c8833b95732e318e0aa9264b6ec318f50154039775935798bbae9b9de6cafa
-
SHA512
a57e2643e9dd167bd53596ac8be751cb66f7b28b87462e7fded3ee83fa8c8b962822c217fa27692e1a5252e1e862bbb758bf42e3fc8aac755019670fbdb5b66a
-
SSDEEP
98304:ovxL26AaNeWgPhlmVqkQ7XSKmBRJ6BweYR:2/4SDEwpR
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20231129-en
Malware Config
Extracted
quasar
1.4.1
Office04
littlebirdyy-26683.portmap.host:26683
91a6c51e-b9c8-459f-82b5-8fd3ea82ad14
-
encryption_key
91837990C32A7683311E3E452264F10B98C1534B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft Service
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
ae02283593dc891884170b46eb346a51
-
SHA1
7fbb3b77f2be8fe31bca479b857d18c421edc75c
-
SHA256
f4c8833b95732e318e0aa9264b6ec318f50154039775935798bbae9b9de6cafa
-
SHA512
a57e2643e9dd167bd53596ac8be751cb66f7b28b87462e7fded3ee83fa8c8b962822c217fa27692e1a5252e1e862bbb758bf42e3fc8aac755019670fbdb5b66a
-
SSDEEP
98304:ovxL26AaNeWgPhlmVqkQ7XSKmBRJ6BweYR:2/4SDEwpR
-
Quasar payload
-
Executes dropped EXE
-